|
| 1 | +--- |
| 2 | + |
| 3 | +title: Sign-ins using legacy authentication workbook in Azure AD | Microsoft Docs |
| 4 | +description: Learn how to use the sign-ins using legacy authentication workbook. |
| 5 | +services: active-directory |
| 6 | +documentationcenter: '' |
| 7 | +author: MarkusVi |
| 8 | +manager: karenho |
| 9 | +editor: '' |
| 10 | + |
| 11 | +ms.service: active-directory |
| 12 | +ms.topic: reference |
| 13 | +ms.workload: identity |
| 14 | +ms.subservice: report-monitor |
| 15 | +ms.date: 03/16/2022 |
| 16 | +ms.author: markvi |
| 17 | +ms.reviewer: besiler |
| 18 | + |
| 19 | +ms.collection: M365-identity-device-management |
| 20 | +--- |
| 21 | + |
| 22 | +# Sign-ins using legacy authentication workbook |
| 23 | + |
| 24 | +Have you ever wondered how you can determine whether it is safe to turn off legacy authentication in your tenant? The sign-ins using legacy authentication workbook helps you to answer this question. |
| 25 | + |
| 26 | +This article gives you an overview of this workbook. |
| 27 | + |
| 28 | + |
| 29 | +## Description |
| 30 | + |
| 31 | + |
| 32 | + |
| 33 | +Azure AD supports several of the most widely used authentication and authorization protocols including legacy authentication. Legacy authentication refers to basic authentication, which was once a widely used industry-standard method for passing user name and password information through a client to an identity provider. |
| 34 | + |
| 35 | +Examples of applications that commonly or only use legacy authentication are: |
| 36 | + |
| 37 | +- Microsoft Office 2013 or older. |
| 38 | + |
| 39 | +- Apps using legacy auth with mail protocols like POP, IMAP, and SMTP AUTH. |
| 40 | + |
| 41 | + |
| 42 | +Single-factor authentication (for example, username and password) doesn’t provide the required level of protection for today’s computing environments. Passwords are bad as they are easy to guess and humans are bad at choosing good passwords. |
| 43 | + |
| 44 | + |
| 45 | +Unfortunately, legacy authentication: |
| 46 | + |
| 47 | +- Does not support multi-factor authentication (MFA) or other strong authentication methods. |
| 48 | + |
| 49 | +- Makes it impossible for your organization to move to passwordless authentication. |
| 50 | + |
| 51 | +To improve the security of your Azure AD tenant and experience of your users, you should disable legacy authentication. However, important user experiences in your tenant might depend on legacy authentication. Before shutting off legacy authentication, you may want to find those cases so you can migrate them to more secure authentication. |
| 52 | + |
| 53 | +The sign-ins using legacy authentication workbook lets you see all legacy authentication sign-ins in your environment so you can find and migrate critical workflows to more secure authentication methods before you shut off legacy authentication. |
| 54 | + |
| 55 | + |
| 56 | + |
| 57 | + |
| 58 | +## Sections |
| 59 | + |
| 60 | +With this workbook, you can distinguish between interactive and non-interactive sign-ins. This workbook highlights which legacy authentication protocols are used throughout your tenant. |
| 61 | + |
| 62 | +The data collection consists of three steps: |
| 63 | + |
| 64 | +1. Select a legacy authentication protocol, and then select an application to filter by users accessing that application. |
| 65 | + |
| 66 | +2. Select a user to see all their legacy authentication sign-ins to the selected app. |
| 67 | + |
| 68 | +3. View all legacy authentication sign-ins for the user to understand how legacy authentication is being used. |
| 69 | + |
| 70 | + |
| 71 | + |
| 72 | + |
| 73 | + |
| 74 | + |
| 75 | +## Filters |
| 76 | + |
| 77 | + |
| 78 | +This workbook supports multiple filters: |
| 79 | + |
| 80 | + |
| 81 | +- Time range (up to 90 days) |
| 82 | + |
| 83 | +- User principal name |
| 84 | + |
| 85 | +- Application |
| 86 | + |
| 87 | +- Status of the sign-in (success or failure) |
| 88 | + |
| 89 | + |
| 90 | + |
| 91 | + |
| 92 | + |
| 93 | +## Best practices |
| 94 | + |
| 95 | + |
| 96 | +- **[Enable risky sign-in policies](../identity-protection/concept-identity-protection-policies.md)** - To prompt for multi-factor authentication (MFA) on medium risk or above. Enabling the policy reduces the proportion of active real-time risk detections by allowing legitimate users to self-remediate the risk detections with MFA. |
| 97 | + |
| 98 | +- **[Enable a risky user policy](../identity-protection/howto-identity-protection-configure-risk-policies.md#user-risk-with-conditional-access)** - To enable users to securely remediate their accounts when they are high risk. Enabling the policy reduces the number of active at-risk users in your organization by returning the user’s credentials to a safe state. |
| 99 | + |
| 100 | + |
| 101 | + |
| 102 | + |
| 103 | + |
| 104 | +## Next steps |
| 105 | + |
| 106 | +- To learn more about identity protection, see [What is identity protection](../identity-protection/overview-identity-protection.md). |
| 107 | + |
| 108 | +- For more information about Azure AD workbooks, see [How to use Azure AD workbooks](howto-use-azure-monitor-workbooks.md). |
| 109 | + |
0 commit comments